{"id":450242,"date":"2025-12-10T17:29:24","date_gmt":"2025-12-10T14:29:24","guid":{"rendered":"https:\/\/menatech.net\/en\/?p=450242"},"modified":"2025-12-17T16:28:31","modified_gmt":"2025-12-17T13:28:31","slug":"how-your-iphone-can-be-hacked-without-you-touching-it-inside-operation-triangulation-an-interview-with-kaspersky","status":"publish","type":"post","link":"https:\/\/menatech.net\/en\/how-your-iphone-can-be-hacked-without-you-touching-it-inside-operation-triangulation-an-interview-with-kaspersky\/","title":{"rendered":"How Your iPhone Can Be Hacked Without You Touching It: Inside Operation Triangulation | An Interview with Kaspersky"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A cyberattack more sophisticated than Stuxnet has been targeting iPhones via a hidden <\/span><b>iMessage<\/b><span style=\"font-weight: 400;\"> exploit. In this interview, <\/span><b>Boris Larin<\/b><span style=\"font-weight: 400;\">, Principal Security Researcher at <\/span><b>Kaspersky,<\/b><span style=\"font-weight: 400;\"> exposes &#8220;Operation Triangulation,&#8221; a terrifying <\/span><b>Zero-Click<\/b><span style=\"font-weight: 400;\"> attack chain that compromises devices without any user interaction.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Larin breaks down how attackers chained together 5 Zero-Day vulnerabilities to gain root access to <\/span><b>iPhones<\/b><span style=\"font-weight: 400;\">, and how Kaspersky researchers caught this advanced spyware on their own devices. We also discuss the weaponization of AI in exploit development and the mechanics of massive Supply Chain attacks like the Asus incident<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cyberattack more sophisticated than Stuxnet has been targeting iPhones via a hidden iMessage exploit. In this interview, Boris Larin, Principal Security Researcher at Kaspersky, exposes &#8220;Operation Triangulation,&#8221; a terrifying Zero-Click attack chain that compromises devices without any user interaction. Larin breaks down how attackers chained together 5 Zero-Day vulnerabilities to gain root access to [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":450243,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":[],"meta":{"_acf_changed":false,"_breakdance_hide_in_design_set":false,"_breakdance_tags":"","footnotes":""},"categories":[29345,29339],"tags":[29352,29380,27373,29387],"audience-intent":[],"content-types":[],"country":[],"entity":[],"persona":[],"class_list":["post-450242","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-special-interviews","category-videos","tag-artificial-intelligence","tag-cybersecurity","tag-kaspersky","tag-video-interviews"],"acf":[],"_links":{"self":[{"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/posts\/450242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/comments?post=450242"}],"version-history":[{"count":0,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/posts\/450242\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/media\/450243"}],"wp:attachment":[{"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/media?parent=450242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/categories?post=450242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/tags?post=450242"},{"taxonomy":"audience-intent","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/audience-intent?post=450242"},{"taxonomy":"content-types","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/content-types?post=450242"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/country?post=450242"},{"taxonomy":"entity","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/entity?post=450242"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/format?post=450242"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/menatech.net\/en\/wp-json\/wp\/v2\/persona?post=450242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}